Security Architect
Design, build, and oversee the implementation of network and computer security for an organisation.
Job opportunities
-
Jobs in SEEK right nowJob growth
-
In the last 3 monthsSalary
-
Typical salaryJob satisfaction
-
Job opportunities
-
Jobs in SEEK right nowSalary
-
Typical salaryJob growth
-
In the last 3 monthsJob satisfaction
-
On this page
- What's it like to be a Security Architect?
- Latest Security Architect jobs
- Top skills and experience for Security Architects
What's it like to be a Security Architect?
A Security Architect designs, builds and oversees the implementation of network and computer security for an organisation. They create complex security structures to prevent cyber threats and develop strategies to respond to and recover from breaches. Their work is crucial in protecting an organisation's data and information systems.Tasks and duties
- Designing and creating robust security architectures for IT projects.
- Developing and implementing policies and procedures for securing networks and systems.
- Conducting research on emerging security threats and solutions.
- Coordinating with IT and other departments to ensure system security aligns with organisational needs.
- Responding to security breaches and incidents, and conducting post-incident analysis.
- Staying up-to-date with the latest security systems, standards, protocols, and products.
Compare your salary
Find out how your salary compares with the average salary for Security Architects.Latest Security Architect jobs on SEEK
Be one of the first to discover these recently listed jobs, or browse all Security Architect jobs on SEEK right now.Did you find this helpful?
Skills and experience employers are looking for
Having the right skills and experience can make you an in-demand applicant. Security Architect employers on SEEK are looking for job seekers with expertise in the following areas. Security Architecture
Security By Design
Cybersecurity
Security Information & Event Management
Application Security
Information Security
Infrastructure Design
Data Privacy
General Data Protection Regulation
Security Operations
Cissp Certificate
National Security
Mobile Marketing
Incident Response
Loyalty Programs
Identity and Access Management
Conceptual Thinking
Microsoft Azure
Mature Thinking
Data Protection
Source: SEEK job ads and SEEK Profile data
Did you find this helpful?